All of lore.kernel.org
 help / color / mirror / Atom feed
From: akuster808 <akuster808@gmail.com>
To: Sakib Sajal <sakib.sajal@windriver.com>,
	openembedded-devel@lists.openembedded.org
Subject: Re: [meta-oe][PATCH v2] openjpeg: Fix CVE-2020-6851
Date: Wed, 11 Mar 2020 12:39:43 -0700	[thread overview]
Message-ID: <6edd37b1-c032-c6b3-fc8c-3d7b3e82a294@gmail.com> (raw)
In-Reply-To: <20200311191148.77027-1-sakib.sajal@windriver.com>



On 3/11/20 12:11 PM, Sakib Sajal wrote:
> From: Yue Tao <Yue.Tao@windriver.com>
>
> Backport patch from upstream to fix heap-based buffer overflow
>
> Upstream-Status: Backport
> CVE: CVE-2020-6851

Applies to Zeus too.


>
> Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
> Signed-off-by: Sakib Sajal <Sakib.Sajal@windriver.com>
> ---
>  .../openjpeg/openjpeg/CVE-2020-6851.patch     | 32 +++++++++++++++++++
>  .../openjpeg/openjpeg_2.3.1.bb                |  1 +
>  2 files changed, 33 insertions(+)
>  create mode 100644 meta-oe/recipes-graphics/openjpeg/openjpeg/CVE-2020-6851.patch
>
> diff --git a/meta-oe/recipes-graphics/openjpeg/openjpeg/CVE-2020-6851.patch b/meta-oe/recipes-graphics/openjpeg/openjpeg/CVE-2020-6851.patch
> new file mode 100644
> index 000000000..9f2fc901f
> --- /dev/null
> +++ b/meta-oe/recipes-graphics/openjpeg/openjpeg/CVE-2020-6851.patch
> @@ -0,0 +1,32 @@
> +From 024b8407392cb0b82b04b58ed256094ed5799e04 Mon Sep 17 00:00:00 2001
> +From: Even Rouault <even.rouault@spatialys.com>
> +Date: Sat, 11 Jan 2020 01:51:19 +0100
> +Subject: [PATCH] opj_j2k_update_image_dimensions(): reject images whose
> + coordinates are beyond INT_MAX (fixes #1228)
> +
> +---
> + src/lib/openjp2/j2k.c | 8 ++++++++
> + 1 file changed, 8 insertions(+)
> +
> +diff --git a/src/lib/openjp2/j2k.c b/src/lib/openjp2/j2k.c
> +index 14f6ff41..922550eb 100644
> +--- a/src/lib/openjp2/j2k.c
> ++++ b/src/lib/openjp2/j2k.c
> +@@ -9236,6 +9236,14 @@ static OPJ_BOOL opj_j2k_update_image_dim
> +     l_img_comp = p_image->comps;
> +     for (it_comp = 0; it_comp < p_image->numcomps; ++it_comp) {
> +         OPJ_INT32 l_h, l_w;
> ++        if (p_image->x0 > (OPJ_UINT32)INT_MAX ||
> ++                p_image->y0 > (OPJ_UINT32)INT_MAX ||
> ++                p_image->x1 > (OPJ_UINT32)INT_MAX ||
> ++                p_image->y1 > (OPJ_UINT32)INT_MAX) {
> ++            opj_event_msg(p_manager, EVT_ERROR,
> ++                          "Image coordinates above INT_MAX are not supported\n");
> ++            return OPJ_FALSE;
> ++        }
> + 
> +         l_img_comp->x0 = (OPJ_UINT32)opj_int_ceildiv((OPJ_INT32)p_image->x0,
> +                          (OPJ_INT32)l_img_comp->dx);
> +-- 
> +2.17.1
> +
> diff --git a/meta-oe/recipes-graphics/openjpeg/openjpeg_2.3.1.bb b/meta-oe/recipes-graphics/openjpeg/openjpeg_2.3.1.bb
> index ffd4099b4..4045148dd 100644
> --- a/meta-oe/recipes-graphics/openjpeg/openjpeg_2.3.1.bb
> +++ b/meta-oe/recipes-graphics/openjpeg/openjpeg_2.3.1.bb
> @@ -8,6 +8,7 @@ DEPENDS = "libpng tiff lcms zlib"
>  SRC_URI = " \
>      git://github.com/uclouvain/openjpeg.git \
>      file://0002-Do-not-ask-cmake-to-export-binaries-they-don-t-make-.patch \
> +    file://CVE-2020-6851.patch \
>  "
>  SRCREV = "57096325457f96d8cd07bd3af04fe81d7a2ba788"
>  S = "${WORKDIR}/git"



      reply	other threads:[~2020-03-11 19:39 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-03-11 19:11 [meta-oe][PATCH v2] openjpeg: Fix CVE-2020-6851 Sakib Sajal
2020-03-11 19:39 ` akuster808 [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=6edd37b1-c032-c6b3-fc8c-3d7b3e82a294@gmail.com \
    --to=akuster808@gmail.com \
    --cc=openembedded-devel@lists.openembedded.org \
    --cc=sakib.sajal@windriver.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.